Search Results - (( using normalization via algorithm ) OR ( java optimization path algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7

    Smart diagnosis of long bone tumor / Mazni Parimin by Parimin, Mazni

    Published 2005
    “…Here, backpropagation training algorithm will be used and network parameters will be set. …”
    Get full text
    Get full text
    Student Project
  8. 8

    GPS boundary navigation of DrosoBots using MATLAB simulation by Zainal Abidin, Zulkifli, Ngah , Vmi Kalthum, Arshad, Mohd Rizal, Kok , Chee Hou

    Published 2010
    “…The results from the experiment show that the Levy flight algorithm is more suitable to be used compared to normal random. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Feature extraction from oil palm in vitro shoot images by Ismail, Abdul Halim, Marhaban, Mohammad Hamiruce, Mohd Noor, Samsul Bahari, Hashim, Ahmad Tarmizi

    Published 2010
    “…The feature extraction techniques are discussed in this article. The algorithms and methods developed are robust and advanced enough to be used in combination with a machine vision algorithm and automation system. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Next, data collection of normal and anomalous behaviour is collected using Kinect sensor. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…The client invokes the server to establish WSDL contract and communicate via the relevant protocol. Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Computing non-contactable drowsiness monitoring system with mobile machine vision by Alixson Polumpung, Lorita Angeline, Helen Sin Ee Chuo, Tan, Min Keng, Lim, Kit Guan, Teo, Kenneth Tze Kin

    Published 2022
    “…This project proposes a human facial features detection based on color segmentation via skin color and Viola- Jones algorithm for real time application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Indirect Feedback Kalman Filter Based Sensor Fusion for Reducing Navigation Errors of an Autonomous Wheelchair by Soh, Ying Wei

    Published 2018
    “…Fusion of the wheel encoders and gyroscope was effected using indirect feedback Kalman filter algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Improving the evaluation performance of space-time trellis code through visualisation by Harun, Harlisya, Ungku Chulan, Ungku Azmi Iskandar, Khazani, Khamizon

    Published 2011
    “…By comparing it with the enhancement strategy that was discovered via the normal approach (i.e., by analysing algorithm) it was discovered that visualisation had inspired an entirely different pruning technique that outperformed the common approach by 20%. …”
    Get full text
    Get full text
    Conference or Workshop Item